Platformatic

1.1K posts

Platformatic banner
Platformatic

Platformatic

@platformatic

The platform bridging the gap between Node.js developers, operators, and wider business. So you can focus on building 🚀

Katılım Nisan 2022
112 Takip Edilen3.2K Takipçiler
Platformatic
Platformatic@platformatic·
Putting audit logging on your AI gateway's critical request path is one of the most common production mistakes we see. Every audit write adds latency. Every audit failure risks your user-facing response. Here is how we solve it: blog.platformatic.dev/auditable-ai-g…
English
0
0
1
84
Platformatic
Platformatic@platformatic·
📊 The difference with predictive scaling: ✅ 99.47% success rate ✅ 26 ms median latency ✅ No event loop saturation cliff (Compared to 95% / 154 ms for KEDA and 90% / 522 ms for HPA) Stop reacting. Start predicting. Explore White Paper ↓ arxiv.org/abs/2604.19705
English
0
0
2
64
Platformatic
Platformatic@platformatic·
Node.js makes this worse. CPU ≠ real load. The event loop can be saturated while the CPU looks “normal”. That’s where latency suddenly explodes. The cliff. Reactive scalers don’t see it coming.
Platformatic tweet media
English
1
0
2
84
Platformatic
Platformatic@platformatic·
🚀 Kubernetes autoscaling is always late. By the time HPA or KEDA reacts, your app is already overloaded. We built a different approach. Platformatic ICC predicts load trends and scales before the spike hits 👇 blog.platformatic.dev/ahead-of-time-…
English
1
1
2
114
Platformatic
Platformatic@platformatic·
This setup is simpler, and faster. Example We split Next.js image optimization into a separate worker, using the SAME codebase. ❌ No extra repo ❌ No duplication ❌ No noisy neighbour issues Better performance + easier scaling, without added complexity blog.platformatic.dev/run-medusa-kub…
English
0
0
2
50
Platformatic
Platformatic@platformatic·
Watt runs multiple Node.js apps as worker threads in a single process. That means: 🔨 No manual service wiring 🏎️ Fast internal communication 🔢 One runtime, multiple apps Frontend → backend calls stay inside the process, no external hops. Simpler and faster.
English
1
0
3
122
Platformatic
Platformatic@platformatic·
Running @medusajs in production gets complex fast. Frontend, backend, admin, image optimization, routing, Kubernetes… We simplified it with a Watt monorepo: 1️⃣ One repo 1️⃣ One build 1️⃣ One deployable platform Here’s how ↓ blog.platformatic.dev/run-medusa-kub…
Platformatic tweet media
English
1
0
4
263
Platformatic
Platformatic@platformatic·
Your AI integration works in the demo. In production, you're silently losing 15% of your request logs at peak, and your latency doubles every time a provider slows down. This is the operational wall every AI team hits. Here's how to get past it blog.platformatic.dev/auditable-ai-g…
English
0
0
3
72
Platformatic
Platformatic@platformatic·
Stateless works for simple request-response agents. But agents that write code, run it, install packages, manage a virtual filesystem? Each step builds on the last. Stateless means serializing the whole environment. That has a cost. blog.platformatic.dev/agents-in-prod…
English
1
0
1
97
Platformatic
Platformatic@platformatic·
Hot take: most "production-ready" AI agent frameworks aren't. Stateless architecture doesn't work for agents that build real in-process state. You need stateful session management. Change my mind. blog.platformatic.dev/agents-in-prod…
English
1
0
2
117
Platformatic
Platformatic@platformatic·
Idle sessions suspend to save resources. Crashes trigger auto-recovery. Rolling deployments back everything up first. AI agents that finally behave on Kubernetes. Full breakdown: blog.platformatic.dev/agents-in-prod…
English
0
0
1
73
Platformatic
Platformatic@platformatic·
Regina Coordinator solves this. It routes sessions, detects failures in 30 seconds, backs up agent state automatically, and restores conversations on healthy pods, completely transparent to the user.
Platformatic tweet media
English
1
0
2
92
Platformatic
Platformatic@platformatic·
Your Kubernetes pod dies mid-conversation. The agent was mid-task, packages installed, files written, and tools open. Session state is gone. That's a support ticket. That's a trust problem. It happens every deploy. blog.platformatic.dev/agents-in-prod…
English
1
0
3
134
Platformatic
Platformatic@platformatic·
Last week we shipped alongside Regina Coordinator, stateful session recovery for agents on Kubernetes. Reliable sessions + kernel-enforced security, inside Watt, on your own infra. blog.platformatic.dev/agents-in-prod…
English
0
0
2
77
Platformatic
Platformatic@platformatic·
Why it matters: agents run code generated at runtime. A naive setup starts the process, attaches enforcement, and hopes nothing happens in the gap. Any unprotected window is an attack surface. Kernel-level policy from instruction zero.
Platformatic tweet media
English
1
0
2
89
Platformatic
Platformatic@platformatic·
Most agent security setups have a flaw: there's a gap between process start and when enforcement kicks in. Even milliseconds matter. eBPF Sandbox eliminates that window. Policy is active before the first instruction runs. blog.platformatic.dev/agents-in-prod…
English
1
1
2
134